Quantum key distribution protocols in transmission control protocol

A quantum key distribution (QKD) system produced shared secret key and transmitted the key between the sender and receiver in a highly secured transmission. QKD uses the fundamental of quantum properties of a single photon to provide a secured communication channel with absolute security guaranteed...

Full description

Saved in:
Bibliographic Details
Main Author: Kamarul Aizan, Nur Hanani
Format: Thesis
Language:English
Published: 2012
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/30926/1/FSKTM%202012%204R.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-upm-ir.30926
record_format uketd_dc
spelling my-upm-ir.309262015-02-06T00:54:53Z Quantum key distribution protocols in transmission control protocol 2012-01 Kamarul Aizan, Nur Hanani A quantum key distribution (QKD) system produced shared secret key and transmitted the key between the sender and receiver in a highly secured transmission. QKD uses the fundamental of quantum properties of a single photon to provide a secured communication channel with absolute security guaranteed by the laws of physics. This research has developed a simulator software for BB84 and B92 protocols which implemented both protocols in 802.11i WLAN environment. The parameters used for this research are with attack and without attack, where measured by three measurements for both protocols which are final key length, expected key length by eavesdropper and error rate estimation. The 802.11i WLAN is consider as insecure because the tendency to be intercepted by intruders is high. Furthermore, the interference from other consumer devices such as cordless phone and microwave can contribute to degradation of WLAN performance. This type of noise can generate different numbers of final key length and different levels of error rate estimation. Thus, the level of the error rate estimation determined the secrecy of the secret key. The discussion of security issue between BB84 and B92 protocols also discussed in terms of secrecy and strength of the secret key between both protocols in 802.11i WLAN. Quantum theory Computer network protocols Key agreement protocols (Computer network protocols) 2012-01 Thesis http://psasir.upm.edu.my/id/eprint/30926/ http://psasir.upm.edu.my/id/eprint/30926/1/FSKTM%202012%204R.pdf application/pdf en public masters Universiti Putra Malaysia Quantum theory Computer network protocols Key agreement protocols (Computer network protocols) Faculty of Computer Science and Information Technology
institution Universiti Putra Malaysia
collection PSAS Institutional Repository
language English
topic Quantum theory
Computer network protocols
Key agreement protocols (Computer network protocols)
spellingShingle Quantum theory
Computer network protocols
Key agreement protocols (Computer network protocols)
Kamarul Aizan, Nur Hanani
Quantum key distribution protocols in transmission control protocol
description A quantum key distribution (QKD) system produced shared secret key and transmitted the key between the sender and receiver in a highly secured transmission. QKD uses the fundamental of quantum properties of a single photon to provide a secured communication channel with absolute security guaranteed by the laws of physics. This research has developed a simulator software for BB84 and B92 protocols which implemented both protocols in 802.11i WLAN environment. The parameters used for this research are with attack and without attack, where measured by three measurements for both protocols which are final key length, expected key length by eavesdropper and error rate estimation. The 802.11i WLAN is consider as insecure because the tendency to be intercepted by intruders is high. Furthermore, the interference from other consumer devices such as cordless phone and microwave can contribute to degradation of WLAN performance. This type of noise can generate different numbers of final key length and different levels of error rate estimation. Thus, the level of the error rate estimation determined the secrecy of the secret key. The discussion of security issue between BB84 and B92 protocols also discussed in terms of secrecy and strength of the secret key between both protocols in 802.11i WLAN.
format Thesis
qualification_level Master's degree
author Kamarul Aizan, Nur Hanani
author_facet Kamarul Aizan, Nur Hanani
author_sort Kamarul Aizan, Nur Hanani
title Quantum key distribution protocols in transmission control protocol
title_short Quantum key distribution protocols in transmission control protocol
title_full Quantum key distribution protocols in transmission control protocol
title_fullStr Quantum key distribution protocols in transmission control protocol
title_full_unstemmed Quantum key distribution protocols in transmission control protocol
title_sort quantum key distribution protocols in transmission control protocol
granting_institution Universiti Putra Malaysia
granting_department Faculty of Computer Science and Information Technology
publishDate 2012
url http://psasir.upm.edu.my/id/eprint/30926/1/FSKTM%202012%204R.pdf
_version_ 1747811607111532544